Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system

a technology applied in the field of authentication method and system, can solve the problems of method losing value for authentication, inherently vulnerable to counterfeiting of deterministic authentication mechanism,

Inactive Publication Date: 2011-08-09
COPILOT VENTURES FUND III
View PDF2 Cites 217 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0126]One aspect of the current technology exploits random (i.e., non-deterministic, meaning, to the accuracy of measurement, the metric of the characteristic is not predefined by the manufacturing procedure) patterns of distinctive and unique optical fluorescent fibers (or other optically readable materials), and provides a constantly “moving” and non-repeating target, drastically reducing, if not mathematically eliminating, the possibility of duplication. An algorithmically generated numeric value or code is then assigned and printed on to each article, appearing in close proximity to the random pattern that must correspond to the measured characteristics of the pattern.
[0232]It is a feature of the present invention that the aforementioned authentication system provides an off-line (self-) authentication device communicating batch authentication data to a remote central server system for a higher level of analysis, wherein different encryption codes are employed locally and centrally, in order to improve the resistance of the system to security compromise, wherein the remote central server system may optionally employ a complete database of substrate identifications and a set of associated objects, thus confirming that valid substrates have not been authenticated multiple times.

Problems solved by technology

Once the code is broken, however, i.e., a counterfeiter learns to duplicate a “signature,” this method loses value for authentication.
Nevertheless, to the extent that holograms are pre-set and deterministic they may also be duplicated.
Deterministic authentication mechanisms are inherently vulnerable to counterfeiting since the counterfeiter has a “fixed” target.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system
  • Authentication method and system
  • Authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0257]The detailed preferred embodiments of the invention will now be described with respect to the drawings. Like features of the drawings are indicated with the same reference numerals.

[0258]In FIG. 1, a substrate 1 with dichroic fibers 2 located on it is subject to a filter 3 of an incandescent lamp 4. A polarizer 5 is beneath a filter 6 underneath a camera 7 and this camera 7 via a Universal Serial Bus (USB) 9 is connected to a computer 11 which is in turn connected to a bar code scanner 13 via a RS-232 standard serial port 12. The bar code scanner 13 scans the bar code 14 on the substrate 1 and completes the authentication procedure with the aid of the computer 11.

[0259]FIG. 2 shows a thermal transfer ribbon 15 comprising a substrate 19, and positioned on the substrate 19 is a thermosoftenable coating 18 which comprises a layer 16 and a layer 17. Layer 17 comprises a sensible material, e.g. binder compounds. Layer 16 is crystalline, and has a melting temperature above the print...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.

Description

FIELD OF THE INVENTION[0001]The present invention relates to the fields of authentication, security, anti-counterfeiting, and cryptography.BACKGROUND OF THE INVENTION[0002]The issues of authentication and counterfeit deterrence can be important in many contexts. Bills of currency, stock and bond certificates, credit cards, passports, bills of lading, as well as many other legal documents (e.g., deeds, wills, etc.) all must be reliably authentic to be useful. Authentication and avoidance of counterfeiting can also be important in many less obvious contexts. For example, improved verification / counterfeiting prevention mechanisms would be very useful in, for example, verifying the contents of shipping containers, quickly identifying individuals with particular health or criminal histories, etc. Counterfeit products are, by definition, unauthorized copies of a product, its packaging, labeling, and / or its logo(s). Attractive targets for counterfeiters are items with significant brand equ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/74G06V30/224
CPCG07D7/2033G07D7/0043G07D7/1205G07D7/12G07D7/2008H04L9/3247G06V20/80G06V30/224G06V30/418G06V40/172G06V40/1324G06F18/22G06V30/40G06V10/147G06V10/88H04L2209/72A61B5/1172G06K7/10722G06K7/1413H04L9/3236
Inventor FRASER, JAY
Owner COPILOT VENTURES FUND III
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products